4 tutorial series · 8 posts
What is OAuth 2.0 ? Did you know there are many different grant types? A grant type for each type of application you want to create? Come one, lets take a look...
Aug 21, 2023Run Pi-Hole and Unbound locally on your own laptop so that you have a portable 'as secure as can be' internet browsing experience. DNS - just a modern telephone book.
Jan 29, 2023You might have set up some great rules in your iptables to act as a kill switch, only to find out that on installing Docker and running some containers they completely override your rules. Fortunately the fix is easy. Let me show you how. 1. Required Reading I’m going to apply the fix to my...
Oct 4, 2022If your VPN connection drops your machine usually continues to connect to the internet leaking information. Let me show you how to make an iptables killswitch.
Oct 3, 2022Your linux powered laptop is open and vulnerable. Let's harden it a little with the linux iptables firewall. It's not that hard, honest... it is just a text file.
Sep 23, 2022If you like the network-wide protection your home pi-hole provides against adverts, domains that are known phishing sites, or domains that are known to serve malware, then you are going to love finding out that you can have a local laptop install of pi-hole and take it with you where ever you go.
Sep 19, 2022A look at how to clone a Github repository using SSH key pairs, and guidance on how to handle multiple Github accounts on the same machine.
Aug 24, 2022A quick start guide to generate your own SSH public/private keypair. A look at generating both RSA and the more secure Elliptic Curve Ed25519 key type.
Aug 24, 2022
You must be logged in to post a comment.